last executing test programs: 2.008880108s ago: executing program 4 (id=5): mkdirat(0xffffffffffffff9c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) getpid() sched_setaffinity(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x19, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (fail_nth: 4) 1.439671681s ago: executing program 3 (id=4): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x24, &(0x7f0000001100)={0x3, 0x0, 0x4}) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0xfed7, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6002ad"], 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x52, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 1.436074191s ago: executing program 2 (id=3): bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$igmp(0x2, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r5, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) chdir(&(0x7f00000000c0)='./bus\x00') r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 1.425052242s ago: executing program 0 (id=1): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$pppl2tp(0x18, 0x1, 0x1) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x240540c3, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f00000003c0)='\x00', 0x1, 0x20040005, 0x0, 0x0) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xef) close(r2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_page_alloc\x00', r3}, 0x10) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) sendmsg$key(r0, &(0x7f0000000040)={0x500, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="020300090c0000000000000000000000030006000000000002000000e00000010000000000000000020001000000000000000300000000000300050000000000020000007f0000010000000000000000020013"], 0x60}}, 0x0) 1.339130762s ago: executing program 4 (id=7): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1000, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfffffffffffff5f2}}, {@allow_other}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@uid_gt={'uid>', 0xee00}}]}}, 0x1, 0x0, &(0x7f00000001c0)="633aeef5ff137a3bd7d85234d43b9957670b7a0a75957c98948ff6ce0cd4de1c6525b20b16d6dff2074eb9d847a63ca83071f4e729616090db055adbe4518dd6de87841211027f207648604176c9e779e496aee6e167004c7fc59fa59ca1617f0924b3753bb9a76d0560") utimensat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x100) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x1, 0xf, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x8c}}, {{0x6, 0x0, 0xb}, {0x6d}}, [], {{0x6, 0x1, 0xc, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 32) 1.338812852s ago: executing program 4 (id=8): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaa79ff030486dd601b8b97004d88c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e200008b0"], 0x0) recvmmsg(r1, &(0x7f00000045c0)=[{{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000100)=""/189, 0xbd}, {0x0}], 0x2}, 0x8}], 0x1, 0x10021, 0x0) 1.316721932s ago: executing program 1 (id=9): syz_emit_ethernet(0x14, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c20000"], 0x0) 1.310296832s ago: executing program 1 (id=10): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) connect$pppl2tp(r0, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r0, 0x0, 0x0) 1.260119183s ago: executing program 1 (id=11): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getpriority(0x1, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x0, 0xfffd, 0xa}}}, 0xb8}}, 0x0) 1.058673794s ago: executing program 0 (id=12): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000300)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@nouid32}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@resgid}, {@grpquota}, {@usrjquota}]}, 0x3, 0x45c, &(0x7f0000000d00)="$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") mkdirat(0xffffffffffffff9c, 0x0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff"], 0x15) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00ed6a", 0xb, 0x2c, 0x0, @remote, @local, {[], {{0x0, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000000)={0x14, 0x13, 0x1, {0x0, 0x0, 0x1}}, 0x14) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="b8000000000000df"], 0xb8) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) 834.173385ms ago: executing program 1 (id=13): syz_emit_ethernet(0x2ce, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd6ef5c98002982901fec0ffff000000000000ffffe0000001fe8000000000000000000000000000aa"], 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000a000000000000000000000b02000000000000000300000d000000000300000003000000000000000300000004000000030000000000000000000005000000000000005f2e"], &(0x7f0000000b80)=""/4090, 0x5e, 0xffa, 0x1, 0x0, 0x0, @void, @value}, 0x20) 692.019656ms ago: executing program 3 (id=14): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$pppl2tp(0x18, 0x1, 0x1) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000003c0)='\x00', 0x1, 0x20040005, 0x0, 0x0) poll(&(0x7f0000000000)=[{r1}], 0x1, 0xef) close(r1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x500, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="020300090c0000000000000000000000030006000000000002000000e00000010000000000000000020001000000000000000300000000000300050000000000020000007f0000010000000000000000020013"], 0x60}}, 0x0) 584.895397ms ago: executing program 1 (id=15): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000000021200000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0xffffffffffffff86, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = epoll_create1(0x0) r3 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x2e, &(0x7f0000000040)=0x80, 0x4) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0xa0028000}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setfsgid(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x442, 0x0) pipe2(&(0x7f0000000240)={0x0, 0x0}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) splice(r5, &(0x7f0000000040), r6, 0x0, 0x800000000808, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r4, 0x0, 0xfdef) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) link(&(0x7f0000001240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') socket$nl_route(0x10, 0x3, 0x0) mlock(&(0x7f0000ff3000/0xb000)=nil, 0xb000) 517.713887ms ago: executing program 4 (id=16): ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, &(0x7f00000002c0)=""/133, 0xffff1000}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x0, 0x0, 0x9, 0x0, 0x0, 0x2, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x7}}, 0xb8}}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in, 0x0, 0x0, 0x0, 0xfffd, 0xa}}}, 0xb8}}, 0x0) (fail_nth: 2) 380.168707ms ago: executing program 2 (id=17): r0 = socket(0x10, 0x3, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1a, 0xc, &(0x7f0000000740)=ANY=[@ANYRES16=r0, @ANYRES8, @ANYRES16=r0, @ANYRESHEX, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f00000008c0)=ANY=[@ANYRES8=r2, @ANYRES32=r1, @ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000480)='fsi_master_gpio_in\x00', r4, 0x0, 0x2}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000600)={0x2, &(0x7f00000005c0)=[{0x6, 0x0, 0xfe, 0x4}, {0x1ff, 0x8, 0x1, 0x29}]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x5dc77000) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRESDEC], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5, 0x0, 0x7}, 0xf) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000780)}) fstat(0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) pwritev2(r6, 0x0, 0x0, 0x5405, 0x0, 0x0) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000400)={0x1c}, 0xdb}}, 0x0) socket$netlink(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001180)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB='-', @ANYRESDEC], 0x27) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r8 = add_key$user(&(0x7f0000000080), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000b40)="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", 0xfffffe97, 0xfffffffffffffffc) r9 = add_key$keyring(&(0x7f0000001f80), &(0x7f0000001fc0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) getitimer(0x1, &(0x7f0000000580)) r10 = add_key$fscrypt_v1(&(0x7f0000002000), &(0x7f0000002040)={'fscrypt:', @desc3}, &(0x7f0000002080)={0x0, "0fe6592b01b0094cfec2a4a0f1db9a9c9992c35908aed35d752f85adcd64b9f924ee4d3c30f683b1a44ddfc7a0396bfb1971d2bb557a2d670e366764b346e9d5", 0x3f}, 0x48, 0xfffffffffffffffe) r11 = add_key$keyring(&(0x7f0000002100), &(0x7f0000002140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r9, r10, r11, 0x0) keyctl$search(0xa, r8, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, r9) 270.465158ms ago: executing program 3 (id=18): bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$igmp(0x2, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) chdir(&(0x7f00000000c0)='./bus\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='./file0\x00') 197.110929ms ago: executing program 4 (id=19): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018400110800395032303030"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) utime(&(0x7f0000000200)='./file0\x00', 0x0) 144.995789ms ago: executing program 2 (id=20): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="2c0100009e173610ef171e7206de0102030109021200030100000009040000000206"], 0x0) syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000ae5e84b6cfb06000000000000000000000000000000006000000000000000000003133b3eaeda8f2b023a5aeaaec2ab2bb35b93d89ed585c4e941ce4ae66c7c61f95499f814a243ab4155b8e97ab4a4a04b876031283518105f4cef85c8bf4e81b4cc9aef38a43bd"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f00000005c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000005cc0)='mnt/file0\x00', 0x4, &(0x7f0000000000), 0x0, 0x236, &(0x7f0000000300)="$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") r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f00000000c0)="c4c2f9db36b8843b00000f23d80f21f835c00000a00f23f80f28bbf17b00000f2041360fc77ccb09660fe6b49c00800000c4c2cdde02b8440000000f23d00f21f835000000050f23f87d5166baf80cb820684981ef66bafc0ced", 0x5a}], 0x1, 0x0, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000001c0)={0x0, 0xd000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) syz_mount_image$f2fs(&(0x7f00000004c0), &(0x7f00000000c0)='./file0\x00', 0x2008410, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES16=0x0], 0x1, 0x5544, &(0x7f0000000580)="$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") r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) syz_usb_control_io(r0, 0x0, &(0x7f0000000b00)={0x84, &(0x7f00000008c0)=ANY=[@ANYBLOB="0000040000000b0f2d5e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0xa, 0x0, 0x0) bind$inet(r8, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r8, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) setresuid(0xee01, 0x0, 0xee00) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r9) 125.457959ms ago: executing program 1 (id=21): socketpair(0x1d, 0x0, 0x69635b65, &(0x7f0000000180)={0xffffffffffffffff}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00'}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000031c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002400)=@o_path={&(0x7f00000023c0)='./file0\x00', 0x0, 0x18, r0}, 0x18) read$FUSE(r2, &(0x7f0000000380)={0x2020}, 0x2020) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'team_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002b40)=@setlink={0x20, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x801}}, 0x20}}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x200, 0x0}, 0x8) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x4, 0x0, @void, @value, @void, @value}, 0x48) openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x501, 0x0) io_setup(0x5, &(0x7f0000003300)=0x0) io_submit(r7, 0x1, &(0x7f00000035c0)=[&(0x7f0000003380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]) r8 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_attach_bpf(r8, 0x1, 0x3c, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x41) mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200), 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r11 = openat$incfs(r10, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) ioctl$VT_RELDISP(r11, 0xc0386723) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x2) readv(r9, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) ioctl$TIOCVHANGUP(r9, 0x5437, 0x0) 91.22454ms ago: executing program 4 (id=22): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x4, 0x8, &(0x7f0000000000)) socket$xdp(0x2c, 0x3, 0x0) (async) r0 = socket$xdp(0x2c, 0x3, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x7, 0x656e, &(0x7f0000000040)) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_RUN(r1, 0xae80, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000000c0)) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000100)={[0x1, 0xeeef0000, 0x8000000, 0x6000], 0x3, 0x6a, 0x7f}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f0000000180)={0x8c, {{0xa, 0x4e24, 0x6, @private1, 0x9}}, {{0xa, 0x4e24, 0x5, @loopback, 0x9}}}, 0x108) r3 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000002c0)='rxrpc_s\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='[\x00', r3) (async) r4 = request_key(&(0x7f00000002c0)='rxrpc_s\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='[\x00', r3) add_key$fscrypt_provisioning(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)={0x3, 0x0, @b}, 0x48, r4) r5 = socket$inet6_icmp(0xa, 0x2, 0x3a) openat$kvm(0xffffffffffffff9c, &(0x7f0000000500), 0x400080, 0x0) (async) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500), 0x400080, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) (async) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x1) (async) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r7, 0x111, 0x2, 0x0, 0x4) (async) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r7, 0x111, 0x2, 0x0, 0x4) getsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000580), &(0x7f00000005c0)=0x4) (async) getsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000580), &(0x7f00000005c0)=0x4) ppoll(&(0x7f0000000600)=[{r5, 0x40}, {r2, 0x2082}, {r7, 0x3000}, {r2, 0xb230}], 0x4, &(0x7f0000000640)={0x77359400}, &(0x7f0000000680)={[0xefc]}, 0x8) (async) ppoll(&(0x7f0000000600)=[{r5, 0x40}, {r2, 0x2082}, {r7, 0x3000}, {r2, 0xb230}], 0x4, &(0x7f0000000640)={0x77359400}, &(0x7f0000000680)={[0xefc]}, 0x8) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000006c0)=0x0) sched_setscheduler(r8, 0x2, &(0x7f0000000700)=0x12000) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) (async) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000740)={'batadv_slave_0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000880)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@broadcast, @in=@rand_addr=0x64010102, 0x4e22, 0x9, 0x4e24, 0x1fe, 0xa, 0x20, 0x0, 0x1, r10, r11}, {0xc0, 0x7, 0x1, 0x2, 0x4, 0x0, 0x0, 0x7}, {0x9, 0x10000, 0x0, 0x8}, 0x40, 0x6e6bb4, 0x3, 0x0, 0x3}, {{@in=@private=0xa010102, 0x4d4, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x22}, 0x3503, 0x0, 0x1, 0x89, 0x1, 0x101, 0x101}}, 0xe8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r1, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)=r7}, 0x20) syz_open_dev$MSR(&(0x7f0000000e40), 0x7, 0x0) (async) r13 = syz_open_dev$MSR(&(0x7f0000000e40), 0x7, 0x0) sendmmsg$unix(r7, &(0x7f0000001580)=[{{&(0x7f00000009c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000a40)="9159808988e785df38fe44b02902d4d0c59a5d06a08815ce2b4c38537444df01fcf26a48", 0x24}, {&(0x7f0000000a80)="7321de40c65d19bdb01242f744d8eee786575099b5193017950a4270034afe8ef68111202809152951a77de686b2db7a601b1581b36d5ddc9824633c3f3f8104eed2f51c75ebd4aeddc7212159dcd1312f9617da4a1d9da68c2f67a0b4e456453b3aff31ad346b892f410a9c664f67f50614344dc8db812906dff3d19ae12e86c674e4a2c0213dd37044ffd4848553612f8348d89c0147a342096e96ff7f08d97a645b41a284e732738128", 0xab}, {&(0x7f0000000b40)="1a46c31534329ad1f882bba747e2de73c8a0afc4e8a4e2e8ab515dae7a54db6f7f5ed1715b55ebd5cda5eead96d608008d9d43da41859a8a9382291a3a313c073903790b1170d1338dfde7d57793c4fa110431edc7ce49c007c3cdc4efcb9b761ac5a613880cb0c8b679ef628950ebacfe385922f5525dc00a91f32dc0c38849fc9e269bb4fe0104dc961e3fddb624aa884cac43957319ae5e22de04d4a471c79763636e874c985475c8ebcd6bb9dda28d36021f8a2e", 0xb6}, {&(0x7f0000000c00)="5a9d5fbb29f07812a58f938e40b10bb414e34578a6288172f54ca3a56b276d50b165e69e", 0x24}, {&(0x7f0000000c40)="0e99899782ebeb5df5242afa95707ddeefdab83cc62229962cd590f71752a41aa6802cec66fede1212be91695127ef63eff85a43b6cb5414c441f882fc8b91a0dbc5ef461393265ba82d6eb51b97ad647215727f93db1bd68156b39f165f2821927dd859ebdc39658286392cf921aca1db6c9770ba42973776294749757a247e02244de22f71077205a12c7453f0db89d1386cb68b7334924609fb06e386e04954b7e0f0e0649c9fd92f234cae494b70cfdbd724df642803d8ad5cb89c", 0xbd}], 0x5, &(0x7f0000000f40)=[@rights={{0x2c, 0x1, 0x1, [r0, r12, r2, r1, r5, r9, r13]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r6]}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r7, r0]}}], 0x70, 0x40}}, {{&(0x7f0000000fc0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001240)=[{&(0x7f0000001040)="5be8a3a9c80c7649013735b691ddeb866ee6989122757aee2f2202495e7eea50847348e7e994b098b601c082d34c61dd69b1f1443fc7c6aaef205b240f9b0a936c1d191d0e4e5f16602c0188647eb05c9004e33583a5160053676be725a258", 0x5f}, {&(0x7f00000010c0)="2da4dba0b5bb265d5245981751a9e250a815a6d53e0738a728eeaa6e94a59153256bf3cb4c4c4c88f8a05704f991db86133efafeba726421db18c021894549a0f0754a6cce1fe75d7f8878432e39e94ba599b2fab7edf787a4b1bea6c3547a59b039bbbfd431ab88591307de077e0cdb7edd5fdd82c609380abb7774db3185b128f9493179a074df2960598934", 0x8d}, {&(0x7f0000001180)="41e13996f768d8d1b1b4ce1abdf4cab20ef9fcc9ad6d01e032186b3d7693d2715b223da4274dcb57ebd5cdf0060d19ecbef17dffaee071b55c2e437f2a8b2cf10ab9a12c2ce80ee0480af84e70dfe08dfed474b0cf38af914ccf77ff769464a58acfa98282f15d6927086ceb5ff9b147e5d416e842b6da828ab8956eeec8d94c65528440c9b893d3ba0be27c6ffd6939c7a1918fbd9b9599c6f85dc6c0ec189bd966194175ff5e736326650796c51cee1466f73b478feb1d87bae8809678", 0xbe}], 0x3, &(0x7f00000014c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r11}}}, @cred={{0x1c, 0x1, 0x2, {r8, r11}}}, @cred={{0x1c, 0x1, 0x2, {r8, r11}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r2, r1, r5, r2, 0xffffffffffffffff, r6]}}], 0x90, 0x1}}], 0x2, 0x0) 0s ago: executing program 0 (id=23): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x840, &(0x7f0000000540)={[{@test_dummy_encryption}]}, 0x1, 0x236, &(0x7f0000000300)="$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") syz_mount_image$fuse(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000780)=ANY=[@ANYRESHEX=r4, @ANYBLOB="19109ca099715dd25b1b15b8457324d6549962f4b9989371675adf7fb1a4b59e08231c67d53bfd233e4c6561ae7b6d2f3790b33fe0caf8de834771974052b12013658dc3766848a36163c7a37ae60073e8130cd891e9ec21461ddbda35ed88674c346fd517c97525165def910729275c7d1817a5f30a51c952ad26d297a1a87cf62566cdd8b1b79dfd632c8fbf210196e5f5de4134d722fb51fc3726b9d0b642ab29d96e8cc497e96fa05762e8ce7993483f4682620a7402ed9c49d508f2f7a4567c09e0b3357dc486e64696b625b5b8df6fbbfb56f72da851cdcd878861f0b52d67f67debdc1ef219"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) select(0x20000000, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r7, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @rand_addr=0x64010100}, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3f, 0x2, 0x3ff}) keyctl$session_to_parent(0x12) kernel console output (not intermixed with test programs): [ 22.092671][ T24] audit: type=1400 audit(1731956715.060:62): avc: denied { noatsecure } for pid=270 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.095286][ T24] audit: type=1400 audit(1731956715.060:63): avc: denied { write } for pid=270 comm="sh" path="pipe:[13106]" dev="pipefs" ino=13106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 22.098310][ T24] audit: type=1400 audit(1731956715.060:64): avc: denied { rlimitinh } for pid=270 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.101194][ T24] audit: type=1400 audit(1731956715.060:65): avc: denied { siginh } for pid=270 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.2' (ED25519) to the list of known hosts. [ 28.804398][ T24] audit: type=1400 audit(1731956721.780:66): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.805403][ T282] cgroup: Unknown subsys name 'net' [ 28.826987][ T24] audit: type=1400 audit(1731956721.780:67): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.853822][ T24] audit: type=1400 audit(1731956721.810:68): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.854025][ T282] cgroup: Unknown subsys name 'devices' [ 28.961900][ T282] cgroup: Unknown subsys name 'hugetlb' [ 28.967365][ T282] cgroup: Unknown subsys name 'rlimit' [ 29.187795][ T24] audit: type=1400 audit(1731956722.160:69): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.200776][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 29.210791][ T24] audit: type=1400 audit(1731956722.160:70): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.243687][ T24] audit: type=1400 audit(1731956722.160:71): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 29.266681][ T24] audit: type=1400 audit(1731956722.200:72): avc: denied { relabelto } for pid=285 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.266733][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.291868][ T24] audit: type=1400 audit(1731956722.200:73): avc: denied { write } for pid=285 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.325744][ T24] audit: type=1400 audit(1731956722.230:74): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.351094][ T24] audit: type=1400 audit(1731956722.230:75): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.009527][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.016428][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.023792][ T291] device bridge_slave_0 entered promiscuous mode [ 30.031495][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.038421][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.045835][ T291] device bridge_slave_1 entered promiscuous mode [ 30.110677][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.117511][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.124808][ T294] device bridge_slave_0 entered promiscuous mode [ 30.133275][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.140134][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.147308][ T294] device bridge_slave_1 entered promiscuous mode [ 30.158753][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.165634][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.172822][ T295] device bridge_slave_0 entered promiscuous mode [ 30.179195][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.186045][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.193171][ T293] device bridge_slave_0 entered promiscuous mode [ 30.201719][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.208555][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.215784][ T293] device bridge_slave_1 entered promiscuous mode [ 30.230339][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.237169][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.244390][ T295] device bridge_slave_1 entered promiscuous mode [ 30.266741][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.273610][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.280920][ T292] device bridge_slave_0 entered promiscuous mode [ 30.287581][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.294466][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.301767][ T292] device bridge_slave_1 entered promiscuous mode [ 30.425892][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.432758][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.439841][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.446653][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.459119][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.465973][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.473071][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.479851][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.491326][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.498166][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.505323][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.512175][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.522154][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.528991][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.536107][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.542888][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.566007][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.572873][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.579952][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.586766][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.607077][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.614269][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.621396][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.628346][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.635830][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.643055][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.649980][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.656938][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.664013][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.671043][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.677998][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.704114][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.712027][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.719947][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.726806][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.734471][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.742720][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.749546][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.757036][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.765072][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.771942][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.779035][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.786961][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.793790][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.800959][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.808820][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.820656][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.832783][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.840781][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.847598][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.855221][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.863220][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.870029][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.892339][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.900051][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.907974][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.915701][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.923255][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.931230][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.938041][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.945348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.953338][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.960189][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.979594][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.987356][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.995447][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.003371][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.011518][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.018338][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.025815][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.033760][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.040596][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.060247][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.068156][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.076317][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.085166][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.092934][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.100720][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.108401][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.116402][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.124185][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.132328][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.146065][ T292] device veth0_vlan entered promiscuous mode [ 31.157521][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.165766][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.174420][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.183042][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.191291][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.198964][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.206929][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.215230][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.223567][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.231378][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.239075][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.246621][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.253967][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.261298][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.269099][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.277484][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.286153][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.293867][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.303298][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.310702][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.319535][ T294] device veth0_vlan entered promiscuous mode [ 31.327043][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.335263][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.343476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.351048][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.358672][ T291] device veth0_vlan entered promiscuous mode [ 31.366065][ T295] device veth0_vlan entered promiscuous mode [ 31.376274][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.383952][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.392014][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.399237][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.408903][ T293] device veth0_vlan entered promiscuous mode [ 31.417134][ T292] device veth1_macvtap entered promiscuous mode [ 31.426976][ T294] device veth1_macvtap entered promiscuous mode [ 31.435339][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.443779][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.451903][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.459260][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.467692][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.475795][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.483314][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.491285][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.500360][ T295] device veth1_macvtap entered promiscuous mode [ 31.514079][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.521790][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.529733][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.537965][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.546067][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.554297][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.562303][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.570938][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.578979][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.589681][ T291] device veth1_macvtap entered promiscuous mode [ 31.602696][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.610717][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.618574][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.626066][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.634868][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.643307][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.651441][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.659483][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.667674][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.676082][ T293] device veth1_macvtap entered promiscuous mode [ 31.693947][ T295] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 31.721543][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.735267][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.743646][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.752659][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.761227][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.769435][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.770888][ T319] FAULT_INJECTION: forcing a failure. [ 31.770888][ T319] name failslab, interval 1, probability 0, space 0, times 1 [ 31.778112][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.798569][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.807021][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.809937][ T319] CPU: 0 PID: 319 Comm: syz.4.5 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 31.824267][ T319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 31.834171][ T319] Call Trace: [ 31.837299][ T319] dump_stack_lvl+0x1e2/0x24b [ 31.841945][ T319] ? panic+0x812/0x812 [ 31.845831][ T319] ? bfq_pos_tree_add_move+0x43b/0x43b [ 31.851157][ T319] dump_stack+0x15/0x17 [ 31.855119][ T319] should_fail+0x3c6/0x510 [ 31.859385][ T319] ? __alloc_skb+0x80/0x510 [ 31.863715][ T319] __should_failslab+0xa4/0xe0 [ 31.868313][ T319] should_failslab+0x9/0x20 [ 31.872658][ T319] kmem_cache_alloc+0x3d/0x2e0 [ 31.877258][ T319] __alloc_skb+0x80/0x510 [ 31.881421][ T319] ? kmem_cache_alloc+0x168/0x2e0 [ 31.886270][ T319] ? audit_log_start+0x48c/0x9b0 [ 31.891053][ T319] audit_log_start+0x4ae/0x9b0 [ 31.895641][ T319] ? audit_serial+0x30/0x30 [ 31.899986][ T319] ? debug_smp_processor_id+0x17/0x20 [ 31.905193][ T319] ? slow_avc_audit+0x3c0/0x3c0 [ 31.909881][ T319] ? avc_audit_pre_callback+0x2b0/0x2b0 [ 31.915258][ T319] common_lsm_audit+0xe4/0x1ba0 [ 31.919946][ T319] ? ipv6_skb_to_auditdata+0xe80/0xe80 [ 31.925243][ T319] ? __kasan_check_write+0x14/0x20 [ 31.930188][ T319] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 31.935496][ T319] ? _raw_spin_lock+0x1b0/0x1b0 [ 31.940177][ T319] slow_avc_audit+0x26c/0x3c0 [ 31.944679][ T319] ? avc_get_hash_stats+0x180/0x180 [ 31.949716][ T319] ? avc_denied+0x13f/0x1b0 [ 31.954059][ T319] avc_has_perm+0x20b/0x400 [ 31.958394][ T319] ? avc_has_perm_noaudit+0x240/0x240 [ 31.963605][ T319] ? stack_trace_save+0x1c0/0x1c0 [ 31.968460][ T319] ? __kernel_text_address+0x9b/0x110 [ 31.973668][ T319] selinux_bpf+0xcb/0x100 [ 31.977834][ T319] security_bpf+0x72/0xb0 [ 31.982002][ T319] __se_sys_bpf+0x27d/0x11cb0 [ 31.986513][ T319] ? stack_trace_save+0x113/0x1c0 [ 31.991376][ T319] ? terminate_walk+0x407/0x4f0 [ 31.996148][ T319] ? stack_trace_snprint+0xf0/0xf0 [ 32.001099][ T319] ? kmem_cache_free+0xa9/0x1e0 [ 32.005784][ T319] ? kmem_cache_free+0xa9/0x1e0 [ 32.010470][ T319] ? kasan_set_track+0x5d/0x70 [ 32.015066][ T319] ? __x64_sys_bpf+0x90/0x90 [ 32.019495][ T319] ? __kasan_slab_free+0x11/0x20 [ 32.024270][ T319] ? slab_free_freelist_hook+0xc0/0x190 [ 32.029651][ T319] ? kmem_cache_free+0xa9/0x1e0 [ 32.034341][ T319] ? putname+0xe7/0x140 [ 32.038329][ T319] ? do_sys_openat2+0x1fc/0x710 [ 32.043015][ T319] ? __x64_sys_openat+0x243/0x290 [ 32.047878][ T319] ? do_syscall_64+0x34/0x70 [ 32.052305][ T319] ? _kstrtoull+0x3a0/0x4a0 [ 32.056642][ T319] ? kstrtouint_from_user+0x20a/0x2a0 [ 32.061852][ T319] ? kstrtol_from_user+0x310/0x310 [ 32.066798][ T319] ? memset+0x35/0x40 [ 32.070618][ T319] ? __fsnotify_parent+0x4b9/0x6c0 [ 32.075564][ T319] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 32.082000][ T319] ? proc_fail_nth_write+0x20b/0x290 [ 32.087106][ T319] ? proc_fail_nth_read+0x210/0x210 [ 32.092152][ T319] ? security_file_permission+0x86/0xb0 [ 32.097525][ T319] ? rw_verify_area+0x1c3/0x360 [ 32.102213][ T319] ? preempt_count_add+0x92/0x1a0 [ 32.107070][ T319] ? vfs_write+0x852/0xe70 [ 32.111323][ T319] ? kmem_cache_free+0xa9/0x1e0 [ 32.116017][ T319] ? kernel_write+0x3d0/0x3d0 [ 32.120627][ T319] ? __kasan_check_write+0x14/0x20 [ 32.125562][ T319] ? mutex_lock+0xa5/0x110 [ 32.129815][ T319] ? mutex_trylock+0xa0/0xa0 [ 32.134243][ T319] ? __kasan_check_write+0x14/0x20 [ 32.139188][ T319] ? fput_many+0x160/0x1b0 [ 32.143448][ T319] ? debug_smp_processor_id+0x17/0x20 [ 32.148650][ T319] __x64_sys_bpf+0x7b/0x90 [ 32.152937][ T319] do_syscall_64+0x34/0x70 [ 32.157156][ T319] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.162885][ T319] RIP: 0033:0x7f5cf8a17719 [ 32.167142][ T319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.186680][ T319] RSP: 002b:00007f5cf766f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.194912][ T319] RAX: ffffffffffffffda RBX: 00007f5cf8bcf058 RCX: 00007f5cf8a17719 [ 32.202719][ T319] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000000 [ 32.210532][ T319] RBP: 00007f5cf766f090 R08: 0000000000000000 R09: 0000000000000000 [ 32.218342][ T319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.226154][ T319] R13: 0000000000000000 R14: 00007f5cf8bcf058 R15: 00007ffc28bac838 [ 32.315547][ T331] syz.1.6[331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.315603][ T331] syz.1.6[331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.364624][ T331] syz.1.6[331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.375815][ T331] syz.1.6[331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.480427][ T345] overlayfs: failed to resolve './file0': -2 [ 32.733416][ T347] netlink: 104 bytes leftover after parsing attributes in process `syz.1.11'. [ 32.849245][ T349] EXT4-fs error (device loop0): ext4_xattr_inode_iget:404: comm syz.0.12: inode #1: comm syz.0.12: iget: illegal inode # [ 33.054737][ T349] EXT4-fs error (device loop0): ext4_xattr_inode_iget:409: comm syz.0.12: error while reading EA inode 1 err=-117 [ 33.175763][ T349] EXT4-fs warning (device loop0): ext4_expand_extra_isize_ea:2806: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 33.218760][ T360] FAULT_INJECTION: forcing a failure. [ 33.218760][ T360] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 33.241453][ T349] EXT4-fs error (device loop0): ext4_xattr_inode_iget:404: comm syz.0.12: inode #1: comm syz.0.12: iget: illegal inode # [ 33.257267][ T360] CPU: 1 PID: 360 Comm: syz.4.16 Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 33.266708][ T360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 33.276603][ T360] Call Trace: [ 33.279732][ T360] dump_stack_lvl+0x1e2/0x24b [ 33.284246][ T360] ? bfq_pos_tree_add_move+0x43b/0x43b [ 33.289536][ T360] dump_stack+0x15/0x17 [ 33.293526][ T360] should_fail+0x3c6/0x510 [ 33.297778][ T360] should_fail_usercopy+0x1a/0x20 [ 33.302639][ T360] _copy_from_user+0x20/0xd0 [ 33.307074][ T360] iovec_from_user+0xc7/0x330 [ 33.311717][ T360] __import_iovec+0x6d/0x3b0 [ 33.316136][ T360] ? __ia32_sys_shutdown+0x70/0x70 [ 33.321079][ T360] import_iovec+0xe5/0x120 [ 33.325325][ T360] ___sys_sendmsg+0x215/0x2e0 [ 33.329852][ T360] ? __sys_sendmsg+0x280/0x280 [ 33.334474][ T360] ? rw_verify_area+0x1c3/0x360 [ 33.339148][ T360] ? __fdget+0x1bc/0x240 [ 33.343216][ T360] __se_sys_sendmsg+0x1b1/0x280 [ 33.347902][ T360] ? __x64_sys_sendmsg+0x90/0x90 [ 33.352671][ T360] ? ksys_write+0x260/0x2c0 [ 33.357019][ T360] ? debug_smp_processor_id+0x17/0x20 [ 33.362218][ T360] __x64_sys_sendmsg+0x7b/0x90 [ 33.366826][ T360] do_syscall_64+0x34/0x70 [ 33.371073][ T360] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.376795][ T360] RIP: 0033:0x7f5cf8a17719 [ 33.381053][ T360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.383829][ T349] EXT4-fs error (device loop0): ext4_xattr_inode_iget:409: comm syz.0.12: error while reading EA inode 1 err=-117 [ 33.400490][ T360] RSP: 002b:00007f5cf7690038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 33.400503][ T360] RAX: ffffffffffffffda RBX: 00007f5cf8bcef80 RCX: 00007f5cf8a17719 [ 33.400509][ T360] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 33.400513][ T360] RBP: 00007f5cf7690090 R08: 0000000000000000 R09: 0000000000000000 [ 33.400518][ T360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.400523][ T360] R13: 0000000000000000 R14: 00007f5cf8bcef80 R15: 00007ffc28bac838 [ 33.460567][ T349] EXT4-fs (loop0): 1 orphan inode deleted [ 33.468665][ T363] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=363 comm=syz.2.17 [ 33.472190][ T349] EXT4-fs (loop0): mounted filesystem without journal. Opts: journal_ioprio=0x0000000000000005,nouid32,debug_want_extra_isize=0x000000000000005c,minixdf,resgid=0x0000000000000000,grpquota,usrjquota=,,errors=continue [ 33.483511][ T363] cgroup: syz.2.17 (363) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 33.517847][ T363] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 33.595852][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 33.601514][ T373] serio: Serial port ptm0 [ 33.607711][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 33.674220][ T291] EXT4-fs error (device loop0): htree_dirblock_to_tree:1092: inode #2: block 13: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=76, inode=0, rec_len=0, size=1024 fake=0 [ 33.812818][ T24] kauditd_printk_skb: 97 callbacks suppressed [ 33.812851][ T24] audit: type=1400 audit(1731956726.790:171): avc: denied { remove_name } for pid=291 comm="syz-executor" name="lost+found" dev="loop0" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 33.867270][ T291] ------------[ cut here ]------------ [ 33.892190][ T291] kernel BUG at fs/namei.c:2786! [ 33.902634][ T291] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 33.908520][ T291] CPU: 1 PID: 291 Comm: syz-executor Not tainted 5.10.226-syzkaller-00001-g6a01908517df #0 [ 33.918318][ T291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 33.928225][ T291] RIP: 0010:may_delete+0x755/0x760 [ 33.933253][ T291] Code: 44 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c db fd ff ff 4c 89 ef e8 0c 32 f4 ff e9 ce fd ff ff e8 22 97 b6 ff 0f 0b e8 1b 97 b6 ff <0f> 0b 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 [ 33.952692][ T291] RSP: 0018:ffffc90000bd7c90 EFLAGS: 00010293 [ 33.958588][ T291] RAX: ffffffff81b415d5 RBX: ffff88810cf0d030 RCX: ffff88811f6c93c0 [ 33.966405][ T291] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000000000000000 [ 33.974212][ T291] RBP: ffffc90000bd7d10 R08: ffffffff81b40ef3 R09: 0000000000000003 [ 33.982024][ T291] R10: fffff5200017af78 R11: dffffc0000000001 R12: 0000000000000001 [ 33.989835][ T291] R13: ffff88810ce7a990 R14: ffff88811bcdce60 R15: dffffc0000000000 [ 33.997650][ T291] FS: 0000555591b5a500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 34.006419][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.012836][ T291] CR2: 0000000020001580 CR3: 000000011f546000 CR4: 00000000003506a0 [ 34.020649][ T291] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.028456][ T291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.036268][ T291] Call Trace: [ 34.039403][ T291] ? __die_body+0x62/0xb0 [ 34.043564][ T291] ? die+0x88/0xb0 [ 34.047122][ T291] ? do_trap+0x1a4/0x310 [ 34.051203][ T291] ? may_delete+0x755/0x760 [ 34.055544][ T291] ? handle_invalid_op+0x95/0xc0 [ 34.060314][ T291] ? may_delete+0x755/0x760 [ 34.064658][ T291] ? exc_invalid_op+0x32/0x50 [ 34.069166][ T291] ? asm_exc_invalid_op+0x12/0x20 [ 34.074028][ T291] ? may_delete+0x73/0x760 [ 34.078276][ T291] ? may_delete+0x755/0x760 [ 34.082630][ T291] ? may_delete+0x755/0x760 [ 34.086966][ T291] vfs_rmdir+0x2c/0x3f0 [ 34.090955][ T291] incfs_kill_sb+0x108/0x220 [ 34.095386][ T291] deactivate_locked_super+0xad/0x110 [ 34.100600][ T291] deactivate_super+0xbe/0xf0 [ 34.105111][ T291] cleanup_mnt+0x45c/0x510 [ 34.109354][ T291] __cleanup_mnt+0x19/0x20 [ 34.113610][ T291] task_work_run+0x129/0x190 [ 34.118034][ T291] exit_to_user_mode_loop+0xbf/0xd0 [ 34.123069][ T291] syscall_exit_to_user_mode+0xa2/0x1a0 [ 34.128448][ T291] do_syscall_64+0x40/0x70 [ 34.132703][ T291] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 34.138431][ T291] RIP: 0033:0x7f7e3d470a47 [ 34.142683][ T291] Code: a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 [ 34.162126][ T291] RSP: 002b:00007fffafbfff28 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 34.170368][ T291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f7e3d470a47 [ 34.178176][ T291] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007fffafbfffe0 [ 34.185988][ T291] RBP: 00007fffafbfffe0 R08: 0000000000000000 R09: 0000000000000000 [ 34.193800][ T291] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fffafc010d0 [ 34.201614][ T291] R13: 00007f7e3d4e25fc R14: 0000000000007fde R15: 00007fffafc02190 [ 34.209421][ T291] Modules linked in: [ 34.230587][ T24] audit: type=1400 audit(1731956726.830:172): avc: denied { unlink } for pid=291 comm="syz-executor" name="lost+found" dev="loop0" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 [ 34.238398][ T291] ---[ end trace 7e02ffcc3436b388 ]--- [ 34.254053][ T24] audit: type=1400 audit(1731956726.840:173): avc: denied { rmdir } for pid=291 comm="syz-executor" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 34.258741][ T291] RIP: 0010:may_delete+0x755/0x760 [ 34.281839][ T24] audit: type=1400 audit(1731956726.860:174): avc: denied { create } for pid=378 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 34.285535][ T291] Code: 44 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c db fd ff ff 4c 89 ef e8 0c 32 f4 ff e9 ce fd ff ff e8 22 97 b6 ff 0f 0b e8 1b 97 b6 ff <0f> 0b 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 56 53 48 89 fb e8 [ 34.321692][ T24] audit: type=1400 audit(1731956726.860:175): avc: denied { create } for pid=378 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 34.343506][ T24] audit: type=1400 audit(1731956726.870:176): avc: denied { getopt } for pid=378 comm="syz.4.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 34.362702][ T24] audit: type=1400 audit(1731956726.870:177): avc: denied { ioctl } for pid=378 comm="syz.4.22" path="socket:[15848]" dev="sockfs" ino=15848 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 34.383161][ T291] RSP: 0018:ffffc90000bd7c90 EFLAGS: 00010293 [ 34.392801][ T291] RAX: ffffffff81b415d5 RBX: ffff88810cf0d030 RCX: ffff88811f6c93c0 [ 34.400670][ T291] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000000000000000 [ 34.408462][ T291] RBP: ffffc90000bd7d10 R08: ffffffff81b40ef3 R09: 0000000000000003 [ 34.416778][ T291] R10: fffff5200017af78 R11: dffffc0000000001 R12: 0000000000000001 [ 34.424777][ T291] R13: ffff88810ce7a990 R14: ffff88811bcdce60 R15: dffffc0000000000 [ 34.432638][ T321] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 34.432726][ T291] FS: 0000555591b5a500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 34.448818][ T291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.455432][ T291] CR2: 00007f5cbe741178 CR3: 000000011f546000 CR4: 00000000003506a0 [ 34.463273][ T291] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.471138][ T291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.478943][ T291] Kernel panic - not syncing: Fatal exception [ 34.485016][ T291] Kernel Offset: disabled [ 34.489139][ T291] Rebooting in 86400 seconds..